[0026]We shall now present a detailed description of the structure of the security system that is a desirable mode of execution of this invention by reference to the appended figures.
[0027] 10 server means 11 web server 12 data base server 20 communications device 21, 22, 23 camera devices 100 security system
[0028]FIG. 1 is a schematic diagram of the security system 100 that is a desirable embodiment this invention. It can be understood that this security system 100, which makes use of the internet line 80, is constructed with server means 10 as its center. Server means 10 contains the web server 11 and the database server 12. On the other hand, several camera devices 21, 22 and 23 and at least one communications device 20 are installed in the place 200 that is to be monitored in the buildings for each family. When security system 100 is used for home security, camera devices 21, 22 and 23 are installed in the necessary sites inside and outside the house. Although there are three camera devices in the figure, there is no limitation on the number of devices, and the number can be increased or decreased, as required. As shown in FIG. 1, the sensor 29 is also installed. In the specification no particularly detailed description about the sensor 29, but the sensor 29 can send some information to server means 10, (the database server 12) and is also used for judging the situation.
[0029]As described, camera devices 21, 22 and 23 can communicate with communications device 20. The communication between camera devices 21, 22 and 23 and communications device 20 can be lines that are installed in ordinary houses such as power source lines and wireless communication means such as Bluetooth™. On the other hand, communications device 20 can be connected to web server 11 of server means 10 through public telephone line 71 by dial-up connections, and the internet service provider 81. Further, server means 10 can be connected to user terminal 28, which can form a mirror image architecture, through internet line 80, the internet service provider 82 and the public telephone line 72. Establishment of communication and its action will be described subsequently.
[0030]FIG. 2 shows the four types of setting modes of the system. Switching of these setting modes can be performed by communications device 20. “Off mode” signifies a state in which a person or owner exists in [is at] the site, and there is no need of monitoring and camera devices 21, 22 and 23 are not being performed. “Security on mode” is the mode that is set when the owner is not present and monitoring by camera devices 21, 22 and 23 is requested. For example, when the owner is going out and this mode has been selected, operation of this mode begins and monitoring by camera devices 21, 22 and 23 can start after preselected time for the controller to go out. The other two modes, the “time designation mode” and the “message sending mode” are not always necessary and they are for providing supplemental actions. This will be discussed subsequently. Prior to that, we shall present a detailed description of the action of the “security on mode.” Other modes also can be set in security system 100.
[0031]FIG. 3 shows the detailed structure of camera devices 21, 22 and 23 and of communications device 20 that are installed at the site 200 to be monitored. Because camera devices 21, 22 and 23 have the same structure, we shall describe only camera device 21 as a representative example. Camera device 21 has the camera image-receiving component 41, the data-processing component 42, the memory component 43, the transmitting-receiving component 44 and the control component 45. The communications device 20 has the first transmitting-receiving component 91, data processing component 92, the memory component 93 and the second transmitting-receiving component 94. Camera devices 21, 22 and 23 also have the voice detection unit 49, which includes a microphone so that voice information can be incorporated in addition to image information and it can be combined with image data to serve as monitoring data. Consequently, although we shall describe only image data for convenience in the subsequent explanation, the term image data can also include voice data.
[0032]When the system is set to the “security on mode,” cameras 21, 22 and 23 receive the signal of operation starting from communications device 20. At this time, camera devices 21, 22 and 23 either operate independently from the communication device 20 with the communication being off state or have communication of preparation signal exchange with communication device 20 under decreased power consumption.
[0033]We shall describe this operation of camera device 21 as a representative example. The camera image-receiving component 41 inside camera device 21 sends the received image to data-processing component 42 as image data. Data-processing unit 42 has a function of motion detection for detecting objects performing specified movements. Specifically, when an image of a moving intruder is imaged in camera image-receiving component 41, the presence of the intruder can be detected from the information relating to movement in the image data in data-processing component 42 which has received the corresponding image data.
[0034]When the presence of an intruder has been detected by data-processing component 42, camera device 21 for the first time establishes a communication connection with communications device 20 and an unusual status reporting signal is sent from transmitting-receiving component 44 to first transmitting-receiving component 91 of communications device 20. The image data before and after detecting the presence of the intruder, as required, are stored in memory component 43 as a still image. All or some of these data are sent to communications device 20 with the unusual status reporting signal or after the signal has been transmitted.
[0035]In first transmitting-receiving component 91, communications device 20, which has received an unusual status reporting signal from at least one of camera devices 21, 22 and 23, operates so as to establish a connection to the internet service provider (ISP) 81 that is to be connected to server means 10 by the second transmitting-receiving component 94. In addition, adjustment of the image data that have been received is performed in data-processing component 92. The image data are adjusted as time-passage still images by each of camera devices 21, 22 and 23 which have received unusual status reporting signals. When the communication connection has been established, communications device 20 sends the unusual status reporting signal and the adjusted image data to server means 10. The unusual status reporting signal and the image data can be combined or they can be sent separately. In both cases, they are transmitted as data forms which include information of relation with camera devices 21, 22 and 23. The image data that have been sent to server means 10 are stored in database server 12. The image data that have been stored temporarily in camera devices 21, 22 and 23 and communications device 20 can be deleted after they have been transmitted appropriately to the next-stage device.
[0036]When an unusual status reporting signal is sent to server means 10 and if the user wishes, automatic notification is performed for the purpose of reporting the fact that there was an unusual status reporting status signal from server means 10. The means of notification can be an electronic mail using internet line 80 to deliver mail to user terminal 28, portable telephone through the telephone company 65 or a telephone 66 in a fixed position. (See FIG. 1.) The user can promptly know some trouble when he is not present. The notification address in this case is not limited to one place and may be several places.
[0037]The image data that have been sent to database server 12 can be seen from the outside by receiving validation when the user access the specific web site. Namely, the user who was informed of the unusual status can know the cause of the report by going onto internet line 80 and accessing web server 11. At the web site, images before and after the abnormality, for example, images of a moving intruder, can be checked so that the user can promptly confirm the presence of an intruder.
[0038]Although not shown in the figure, in such a case, a suitable contact address is prepared on the web site for supporting a prompt response by the user. For example, when the user has confirmed the presence of an intruder, it is possible to connect promptly to a security-guard company or the police 99 through the agency of the web site (i.e., web server 11) so that the intruder can be captured. At this time, by means of the web site (not shown) the user can make a notification by him to some persons by registering a connection address in advance on the web site, which are not the security-guard company or police 99.
[0039]A further characteristic of security system 100 according to the embodiment of the present invention is that the user can control communications device 20 and camera devices 21, 22 and 23 from user terminal 28. By means of the “security on mode”, a request can be made for confirmation of the state from the user side not only when a report has been made but also when a natural disaster such as an earthquake or flooding has occurred. In this embodiment it is realized using internet line 80 in which server means 10 is interposed.
[0040]The user, when necessary, enters the internet line 80 from his own user terminal 28 through the internet service provider 82 and accesses the web site, which is not shown in the figure, but provided by server means 10. On the web site, a menu is prepared for controlling the registered communications device 20 and camera devices 21, 22 and 23 that can communicate with the communication device 20 after user validation. The user selects an appropriate menu, and, by performing a suitable operation, for example, by remotely controlling the control component 45, can make changes in the monitoring angle range and set mode of camera devices 21, 22 and 23.
[0041]Further, the user can access the web site and command the acquisition of existing images from camera devices 21, 22 and 23. In this case, server means 10 establishes communication with communications device 20 on the basis of information that has been provided in advance through the agency of a suitable internet service provider 81 and commands acquisition of images to communications device 20. Communications device 20 forcibly commands camera devices 21, 22 and 23 to transmit the existing image data that have been received. Following that, when camera devices 21, 22 and 23 find an abnormality due to an intruder, the image data are stored in data server means 12 of server means 10 as a result of flow of the same data. In this case, server means 10 notifies user terminal 28 that image acquisition has been completed by means of an electronic mail system through internet line 80. The user can confirm the updated images by accessing the web site later.
[0042]In the case described above, in order to issue a command to camera devices 21, 22 and 23 for acquisition of existing images, a mode (not shown in the figure) may be used in which server means 10 sends a message to communication device 20 directly by using public telephone line. In this case, communications device 20 contains a system that can confirm that there is a telephone signal or calling signal from server means 10. When it has been confirmed that there is a signal from server means 10, communications device 20 issues a command in the same way as described above to camera devices 21, 22 and 23 to transmit image data. Next, communications device 20, which has received the image data, establishes a connection to server means 10 through internet service provider 81 and provides the image data to server means 10. The subsequent operations are the same as in the case described above. The telephoning time by telephone line to communications device 20 from server means 10 in the early stage becomes relatively short time. Therefore, the costs that are generated by telephoning are comparatively inexpensive.
[0043]Incidentally, due to the “security on mode,” there may be an inconvenience that camera devices 21, 22 and 23 are in operation when the owner returns home. In this case, there is the desirable feature that the user can change communications device 20 to the “off” mode by means of a wireless system from outside of the place 200 to be monitored. In the another alternative, when camera devices 21, 22 and 23 detect the movement of the user and recognize an unusual status, it is possible to change the mode to the “off” mode by operating communications device 20 within a specified time and to stop the transmission of the unusual status reporting signal to server means 10.
[0044]Next, we shall explain other two modes, the “time designation monitoring mode” and the “message sending mode” which are supplemental modes that can be added to the “off mode” and the “security on mode.” These two other modes are not necessarily needed for crime prevention.
[0045]By means of the “time designation monitoring mode,” a camera device is installed so that a specified object can be monitored and the object is monitored at a time designated by the user. This mode is used, for example, for observing pets, For example, camera device 21, as a result of receiving the command to acquire images from server means10 thought communications device 20 at a time designated in advance, acquires images at that time. These image data are sent in the same way as in the “security on mode” and are stored in data base server 12. Consequently, the user can confirm the image by accessing the web site. In this mode, it is also possible for the user to acquire images by sending a command from the web site when user request at a non-designated time.
[0046]By means of the “message sending mode,” as described above, for example, messages can be constructed of images and voice specified time length by using the function of voice detection unit 49 installed in camera device 21 where camera device 21 can be controlled by operating a control device that is installed in communication means 20 but that is not shown in the figure. This message can be stored on data base server 12 by the same method as in the “security on mode” described above. The presence of a new message is informed to the user by a system such as electronic mail to the user terminal or by a cell phone in the same way as in the method described above. The user can confirm the content of the message visually or by ear by accessing the web site. The images are not limited to dynamic images and may also be moving images during short periods.
[0047]In the foregoing, we have presented a detailed description of a security system which is a desirable mode of execution of this invention. However, this is strictly an illustration and does not limit this invention. Various modifications can be made by those skilled in the art.